From the course: Threat Modeling: Information Disclosure in Depth

Unlock the full course today

Join today to access over 22,600 courses taught by industry experts or purchase this course individually.

Physical layer

Physical layer

From the course: Threat Modeling: Information Disclosure in Depth

Start my 1-month free trial

Physical layer

- [Instructor] Thumb drives, backup tapes, and other storage devices are often designed to be removed and stored separately. Even though removing hard drives can be a pain, it's not that much of a pain, and once done the data on the disc is likely accessible to anyone who could hold it in their hands. Many things in the internet of things store their operating system and some data on flash drives. Even cloud-oriented devices may have locally stored data like a cash, or security information like passwords all on local storage. The drive encryption is built in. Then the encryption moves with the drive. The operating system manages the key, then it doesn't. So drives that include encryption may or may not delete the key when you move them to a new machine. Good tests are do I need to enter a password when connecting this to a new machine? What if I enter the wrong password? Protecting data at rest helps me rest better at…

Contents